Patchday Alert: Cyber Attackers Exploit Vulnerabilities in Internet Explorer Components on Windows

To protect against recent attacks targeting various versions of Windows and Windows Server, administrators are urged to activate Windows Update and ensure they have the latest security patches installed. Notably, Microsoft has issued updates addressing multiple vulnerabilities in its software suite, including Office and Visual Studio.

Current Exploitation

A vulnerability identified as CVE-2025-33053 is currently being exploited by attackers. This vulnerability relates to components of the discontinued Internet Explorer 11, impacting EdgeHTML and MSHTML, which remain used by legacy applications such as WebView. For an attack to succeed, victims must click on a malicious link, granting attackers the ability to execute harmful code on the system. Crucially, all supported Windows and Windows Server versions are affected, as well as unsupported versions like Windows Server 2008, which still receive patches due to the severity of this threat.

Additional Threats

Further threats include a vulnerability in Windows SMB (CVE-2025-33073), associated with inadequate access controls, allowing attackers to escalate user privileges. Several vulnerabilities in Microsoft Office and SharePoint Server, such as CVE-2025-47162, have also been classified as critical. These vulnerabilities primarily stem from the preview function in Office, enabling malicious code to potentially infiltrate systems.

For comprehensive details on the vulnerabilities addressed in the recent security updates, administrators can refer to Microsoft’s Security Update Guide.

Recommended Actions

  • Enable Windows Update and apply all security patches.
  • Educate users on the dangers of clicking unknown links to mitigate attack risks.
  • Continuously monitor systems for any signs of compromise.

For more detailed insights and updates regarding vulnerabilities, please check the official Microsoft resources linked above.


Posted

in

by

Tags: